Email/Spam/Virus Questions

Network Questions

Computer/Microsoft Office Questions

VoIP Questions

 

 

100 bldg rack

 

 

 

Email?Spam/Virus

How can I reduce the size of my mailbox? How can I backup my email?

How Do I get my Shasta College email forwarded to my personal email?

What is Spam?

Most Spam messages have a “remove” link in order to a remove yourself from their mail lists. Won't that take care of the problem?

What type of files does the Spam filter Block?

What are some of the file types Spam filter quarantines?

What is a black list?

What is a white list?

What is a false positive?

What is e-mail address spoofing?

What is 'phishing'?

How many e-mail messages does the campus receive each day?

How many of the e-mail messages received can be defined as “Spam?”

Is it possible to get an e-mail virus from a Spam message?

With the new College anti-Spam tool solution is in place, will I still receive Spam messages?

I understand that each message coming into the College mail system will go through the anti-Spam tool solution and will receive a rating. How does this rating system work?

Does the new anti-Spam solution also perform a virus check?

Do I still need to run a virus checker on my local PC?

How is Spam bad?

How do I access my email from home?

What is spyware or adware?

 

 

 

 

 

 

Network

I purchased my own laptop. Can I hook it up to the Shasta College network?

How do I contact a technician?

How do I change my password?

File Sharing and File Sharing programs. Are they illegal?

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Computer/Office

There is a message in my email that reads, “Outlook blocked access to the following potentially unsafe attachments: attachment name” or “”. Is my computer infected with a virus?

How do I contact a technician?

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

VoIP

How do I log into the web interface for my phone?

Can I change my voicemail message or greeting from home?

I installed a headset on my phone and it isn't working. What do I do?

My phone is just acting weird. It says Discovery failure or searching for NBX what should I do?

My phone answers calls all by itself. Is it possessed?

My phone rings once and stops. And then in a few seconds it shows I have voicemail. Why is that?

How do I configure my voicemail?

How do I change my voicemail settings after it is configured?

What is the model of my phone?

How do I transfer a call?

How do I make a conference call from a 3101 phone?

How do I make a conference call from a 3102 phone?

How do I make a conference call from a 3103 phone?

How do I adjust my phones volume levels?

 

 

 

 

 

 

 

 

 

 

 

 

 

My information in the Global Address List is wrong. Can I correct it?
Please click here to change your information. When the software starts, click on run. Click on run again for the security warning. Select the Outlook profile option and select ok. You can then change certain fields of information.

 

Backup my Email
To read a document on how to backup or archive your email, click here. To watch a webcast of how to backup and archive your email, click here.

Email Forward?
Simply fill out this form and your email will be forwarded to your personal email. This form is currently unavailable. We are waiting for approval. Please contact your center secretary for the current form.

What is Spam
Spam is unwanted, unsolicited e-mail similar to junk mail you get in
your regular mail. The technical terms are Unsolicited Bulk e-mail
(UBE) and Unsolicited Commercial e-mail (UCE). Very often you won't
even see your own e-mail address on the TO: line as they send it to
one e-mail address and hide thousands of other e-mail addresses
behind it. You may think they didn't mean to send it to you, but
they did!


Most Spam messages have a “remove” link in order to a remove yourself from their mail lists. Won't that take care of the problem?
NEVER, EVER reply to a remove address. If the people sending you the
Spam were ethical individuals, they would not be invading your inbox
with their junk. Replying to a remove address does one thing:
confirms your e-mail address as legitimate so the Spammers can sell
your address to all their friends.
How did “Spammers” get my address?
Spammers get your address in a variety of ways. If you sign up for
and use a file-sharing mechanism like Kazaa, your e-mail address
is likely to be sold. Even seemingly innocuous sites can turn
around and provide your e-mail to their advertisers, with the
result being that you begin receiving unsolicited e-mail messages
from them. Also, if you have your e-mail address on a Web page, it
is easy for unscrupulous advertisers (or worse) to search your Web
page for your e-mail address. It is unfortunately easy and very
inexpensive for these companies to send out huge volumes of Spam.

What type of files does the Spam filter block?
The spam filter is currently set to block files with the extensions .pif, .scr, .vbs, .zip. These type of files are the most commonly used for viruses. The recommended method for receiving these type of files is to have the sender rename the file from file.zip ti file.zip.old. When you receive the file you would need to rename it from file.zip.old back to file.zip.

What are some of the types of files the Spam filter quarantines?
The spam filter is currently set to quarantine files with the extensions ,bat,cmd,com,cpl,crt,dll,exe,jse,lnk,mde,msc,msi,msp,mst,reg,shb,shs,vb,vbe. These type of files are the most commonly used for viruses. The recommended method for receiving these type of files is to have the sender rename the file from file.zip ti file.zip.old. When you receive the file you would need to rename it from file.zip.old back to file.zip.


What is a black list?
A black list identifies e-mail addresses that are likely Spam
sources and domains that are known to originate Spam. Many
anti-Spam software programs use black lists to control Spam by
refusing any e-mail that originates from one of these sources.
Black lists are usually maintained by anti-Spam organizations or
by individuals with an intense distaste for Spam.

What is a white list?
As the name suggests, a 'white list' is the opposite of a black
list and contains details about addresses and domains that should
never be identified as Spam. For example, some users might receive
regular e-mail messages from a magazine that they have subscribed
to, that might otherwise get tagged as Spam.

What is a false positive?
A legitimate e-mail that is not delivered because Spam filters
incorrectly identified it as Spam mail.

What is e-mail address spoofing?
Spammers use spoofing to make e-mail messages appear to have
originated from someone or somewhere other than the actual source.
It is done by using a fraudulent e-mail return address. Spam might
show the e-mail address of a legitimate company yet have a
completely different return address.
While spoofing is generally associated with Spam, it can be used
legitimately - for example to disguise your identity to send an
anonymous message as a "whistle-blower" who fears retaliation. It
should be noted, however, that spoofing anyone other than yourself
is illegal in some jurisdictions.

What is 'phishing'?
Phishing is a scam where a bogus e-mail masquerades as a message
from a real company. These usually direct recipients toward a
false Web site that looks identical to the real company's Web site
where the user is duped into entering private information such as
a credit card number. Many see phishing as crossing the line
between Spam as a nuisance and Spam as fraud. Common phishing
schemes mimic sites such as PayPal, eBay, and online banking
sites.

How many e-mail messages does the campus receive each day?
As of December 2008, our campus receives approximately 100,000 e-mail
messages each day.

How many of the e-mail messages received can be defined as “Spam?”
The Network and Technology Department estimates that
80% - 90% of these messages are Spam.

Is it possible to get an e-mail virus from a Spam message?
Absolutely! In 2004 the e-mail borne Sobig.F variant became the
biggest and fastest-spreading e-mail virus on record. At its
worst, Sobig.F was responsible for nearly three-quarters of all
Internet e-mail traffic. Industry experts predict viruses and
worms are going to be larger, more sophisticated and more likely
to be sent by Spammers.

With the new College anti-Spam tool solution is in place, will I still receive Spam messages?
Unfortunately, YES. No anti-Spam solution will stop 100% of
unwanted messages without also preventing the delivery of valid
e-mail messages. To insure that valid messages are delivered, the
anti-Spam device is configured to block blatant Spam and deliver
suspected Spam. The [Suspected Spam] tag on the subject line of suspected Spam
can be used to further distinguish between valid messages and
probable Spam messages.
Click here to see the latest SPAM information.

I understand that each message coming into the College mail system will go through the anti-Spam tool solution and will receive a rating. How does this rating system work?
Every message that comes into the email system will be put through a
very thorough rating system and assigned a “SCORE”. Currently,
the recommended settings for the rating system are:
0.0 - 1.9 e-mail will be delivered as normal.
2.0 - 3.9 e-mail will be delivered as normal with [Suspected Spam] added to
the subject line.
> 5.0 e-mail will not be delivered.

Does the new anti-Spam solution also perform a virus check?
Yes, this new Anti-Spam tool also has a very rigid virus checker.

Do I still need to run a virus checker on my local PC?
Yes, we still need as much protection as possible against viruses.
It is possible for a virus to get to your PC from many sources,
not just via an e-mail message.

How is Spam bad?
Spam is a waste. It wastes time, money, and other resources. It also
wastes bandwidth. Each e-mail takes up a nearly insignificant amount
of our bandwidth, but like pennies, they add up. Large amounts of
Spam can also cause our mail servers to crash due to having to deal
with more than is possible. Some Spams are scams, some are
pornography, some are virulent, and some are just designed to waste
your time. 

How do I access my email from home?
Answer - There are two ways to access your Shasta College email from an
off campus location.
#1 - Use the A-Z Index off of the main web page
1. Open your web browser and go to http://www.shastacollege.edu/
2. Click in the A-Z Index in the green menu area (left side of main page).
3. Click on the "E".
4. Click on the link for "email access off campus-web outlook."
5. Type in your user name with the domain name (ie. shastacc\tharris) and then the password.
or

#2 - Use your browser
1. Open your web browser (Internet Explorer or Netscape)
2. Type the address in: http://mail.shastacollege.edu
3. Enter (shastacc\your username) in the space labeled Username.
4. Enter your password in the space labeled Password. Press return.

Your mailbox should now be open.

What is spyware or adware?

Answer - Spyware is any technology that aids in gathering information about a person or organization without their knowledge. Spyware is a program that is put in someone's computer to secretly gather information about the user and relay it to advertisers or other interested parties. Installing a new program from the internet can include spyware. Information is usually collected into a “cookie”. A cookie is a file placed on your computer by a website to remember browser settings and user information. Data collecting programs that are installed with the user's knowledge are not called spyware.

WARNING: Do not attempt to delete cookies off your computer without assistance! Most cookies are harmless and deleting them could cause problems!

Spyware Examples: Ad-Click, Double-Click

Adware is any software application in which advertising banners are displayed while the program is running. The authors of these applications include additional code that delivers the ads, which can be viewed through pop-up windows or through a bar that appears on a computer screen. The justification for adware is that it helps recover programming development cost and helps to hold down the cost for the user.

Adware Examples: Gator, Hotbar, Cydoor

 

 

 

 

 

 

 

I purchased my own laptop. Can I hook it up to the Shasta College network?
Answer - Private computers or laptops are not allowed to connect to the physical Shasta College Network (connected via a cable). There are too many security and support concerns. Violators can have their network privileges revoked! We do have a wireless network for staff and students for you to use. Click here for instructions on how to configue your system.


How do I contact a technician?
Answer - Call the help desk (242-7999) or email (helpdesk@shastacollege.edu). Once you place a call or email to the help desk, a technician will contact you. Trying to contact technicians directly slows down the response time for everyone. 


How do I change my password?
Answer - After you log on to your computer:
1. Press the Ctrl, Alt and Delete buttons down at the same time
2. Click on the Change Password button
3. Enter in your current password as the “Old Password”
4. Type in the password you wish to use in the “New Password” field
5. Retype you new password in the “Confirm Password” field
6. Click on OK

 

 

 

 

 

 


File Sharing and File Sharing programs. Are they illegal?

Answer - File sharing programs are not illegal. How people use them is a different matter. Downloading or sharing of copyrighted material is illegal unless you have written consent of the owner. This includes, but is not limited to, music, videos/movies, pictures and written material. We discourage use of these programs on campus.

Popular File Sharing programs: Kazaa, Morpheous, Bear Share, WinMX, Imesh

Note: Many of these programs install Spyware or Adware as part of the File Sharing program. These can cause your computer to slow down.

 

 

 

 

 

 

 

 

 

 

 

 

 

  

There is a message in my email that reads, “Outlook blocked access to the following potentially unsafe attachments: attachment name” or “”. Is my computer infected with a virus?
Answer - No. The first message means Outlook blocked a file that is a program. It may or may not be a virus but it has been blocked so it cannot be opened. The second message means the virus scanner stopped the virus on the server before you were able to open your email.

There should be no ill effects from the attachment in the email in either case. 

How do I contact a technician?
Answer - Call the help desk (242-7999) or email (helpdesk@shastacollege.edu). Once you place a call or email to the help desk, a technician will contact you. Trying to contact technicians directly slows down the response time for everyone








VoIP

How do I log into the web interface for my phone?
Open a web browser and enter http://myphone (main campus phones), http://myhsupphone (HS&UP Phones), or http://Mysctrphone (Trinity Center). Click on the user button. When prompted to logon your 4 didgit extension is the username and your voicemail password is the password. Click here for more information on using the web interface.

Can I change my voicemail greeting or message from home?
Yes, you can change your message from off campus. From any phone, dial your number; when your message starts, press *. You will then be prompted for your 4 digit extension (your phone number minus the 242); then your password, this is the same 4 digit code that you use to check your voicemail. After that, you will be given a list of options, one of which is to change your "personal greeting." The system will walk you through the steps and you can record a new greeting right over the phone. You can also use these same steps to check voicemail messages while you are away.

I installed a headset on my phone and it isn't working. What do I do?
The Technology department does not support any modifications to your phone such as a headset. If it is a wireless headset you should try to reprogramming the unit, using the directions that came with it.

My phone is just acting weird. What should I do?
Your phone is a small computer and like a computer needs to be rebooted occasionally. To reboot your phone, unplug the cable on the back and the power connector if there is one. Wait about 5 seconds and plug the cords back into the phone into the same locations as they were removed from. It should only take a couple of minutes for your phone to come back online.

My phone answers calls all by itself. Is it possessed?
While it may seem a little creepy, it is not possessed but it is in hands free mode. On a 3103 model, Press the Features soft button. Scroll to Hands Free. Press Select. To cancel this feature, repeat these steps. On a 3102 model, Press Handsfree (located directly under the * button). The indicator light is
lit. Whenever an internal call arrives, a tone sounds and the speakerphone is activated. To turn this feature off, press Handsfree again. This feature is not available on the 3101 model.

My phone rings once and stops. And then in a few seconds it shows I have voicemail. Why is that?
It is set to forward to voicemail. On the 3103 model, Press the Features soft button. Scroll to Forward to Mail. Press Select. To cancel this feature, repeat these steps. On the 3102 model, Press the FWD MAIL button (located directly under the # button). The indicator light comes on; all incoming calls ring once and are forwarded to your default call coverage point. To turn it off, press FWD MAIL again.

How do I configure my voicemail?
If you press the purple button on your phone you will be prompted to configure your voice mail. You will need to set a voicemail password, record your name, and then record your greeting.

How do I change my voicemail settings after it is configured?
Push the purple button to access your voicemail. When the recording starts, press 9 for options. You will then be prompted to make changes. If you have forgotten your voicemail pass, please contact the help desk.

What is the model of my phone?
The model number and pictures are shown below.

3101

3101

3102

3102

3103

3103

3106

3106

 


How do I transfer a call?
Transfer a Call
1. While you are on a call, press Transfer.
2. When you hear the dial tone, dial the number to which
you want to transfer the call.
3. As soon as you hear ringing, press Transfer
(for a blind transfer), or wait until the recipient
answers, announce the call, press Transfer, and then
hang up.

 

How do I make a conference call from a 3101 phone?
Make a Conference Call
1. Place or receive a call. Two parties are now on the call.
2. While you are on the first call, press Feature + 430.
3. Listen for the dial tone. Dial the third party, wait for
that party to answer, and press Feature + 430 again.
4. Optionally, repeat steps 2 and 3 to add a fourth party.
• At least one party must be internal. The conference
ends when the last internal party hangs up.
• To place your part of a conference call on hold,
press Hold or . The other parties can talk to
each other, but they cannot hear you. (Music on
Hold is not played.)
• To transfer a conference call, see Transfer a Call.
• To drop the last person whom you added to the
conference (for instance, if the called party’s
telephone is answered by someone else), press
Feature + 431.
• Some NBX systems are configured so that they
support only 3-party conferences.


How do I make a conference call from a 3102 phone?
Make a Conference Call
1. Place or receive a call. Two parties are now on the call.
2. While you are on the first call, press Conference.
3. Listen for the dial tone. Dial the third party, wait for
that party to answer, and press Conference again to
complete the call.
4. Optionally, repeat steps 2 and 3 to add a fourth party.
• At least one party must be internal. The conference
ends when the last internal party hangs up.
• To place your part of a conference call on hold,
press Hold. The other parties can talk to each other,
but they cannot hear you. (Music on Hold is not
played.)

How do I make a conference call from a 3103 phone?
Make a Conference Call
1. Place or receive a call. Two parties are now on the call.
2. While you are on the first call, press Conference.
3. Listen for the dial tone. Dial the third party, wait for
that party to answer, and press Complete to complete
the three-party conference call.
4. Optionally, repeat steps 2 and 3 to add a fourth party.
(Note: Some NBX systems support 3-party
conferences.)
• At least one party must be internal. The conference
ends when the last internal party hangs up.
• To place your part of a conference call on hold,
press Hold. The other parties can talk to each other,
but they cannot hear you. (Music on Hold is not
played.)
• To transfer a conference call, see Transfer a Call.
• To drop the last party that you added to the
conference (for instance, if the called party’s
telephone is answered by someone else), press the
Right soft button for the call, scroll to Conference
Drop, and press Select.
• Some NBX systems are configured so that they
support only 3-party conferences.

How do I adjust my phones volume levels?
Adjust the Volume
• Handset — Lift the handset, listen to the dial
tone, and repeatedly press the louder or softer
button.
• Speaker — Press , listen to the dial
tone or your caller’s voice, and repeatedly press the
louder or softer button.
• Ringer — While the telephone is ringing, repeatedly
press the louder or softer button.